Do you fancy doing live recon on Real Organizations?
Activate Yourself. And compete in a unique HACKER challenge.
Live Recon Leads
JURY Team
Uncover Your Company's Hidden Assets:
Register for LiveRecon at ReconVillage - DEF CON 32
Benefits For Your Company:
-
Community support: Your participation helps support the community and fund the event’s awesome prizes.
-
Crack team of experts: Engage with the best in the biz who'll unearth gaps lurking in your digital and public presence.
-
VIP treatment: Limited slots mean your company gets the full Sherlock Holmes treatment.
-
Steal of a deal: This one-time OSINT deep dive comes at a nominal fee.
-
Treasure trove report: Walk away with a comprehensive dossier on your company’s exposure and weak spots, including:
-
Exposed assets: Domains, subdomains, phishing domains, mobile apps, IPs, servers, ports/services.
-
Leaked data: Public git repos, pastes, secret keys, buckets, databases, usernames, passwords, and those pesky default credentials. and possibly lot more...
-
Fuel Your Love for OSINT: Dive deep into the world of OSINT and be part of HACKERSUMMERCAMP.
Do Live Recon
Get ready to dive deep and uncover hidden truths in our exhilarating two-day Live Reconnaissance Event. Whether you're a seasoned security expert or an enthusiastic newcomer, we invite you to test your skills in a dynamic environment.
What is this about?
Participants will perform live reconnaissance on a specified list of companies. Your mission is to unearth as much critical information as possible. With your analytical skills and keen eye for detail, explore, probe, and reveal hidden data that could be pivotal.
Who Should Register
This event is perfect for anyone with a knack for cybersecurity, from university students and professional pentesters to hobbyists looking to hone their skills. Teams are encouraged to register and bring diverse skills to tackle the challenges together.
Why Participate?
Experience Real-World Challenges
Engage in real-time recon activities that simulate actual recon assessments and threat analysis.
Learn from the Best
Judging will be conducted by some of the industry's best reconnaissance professionals, offering you a chance to learn through feedback and direct interaction.
Compete and Collaborate
Spend two thrilling days of recon and fun, competing against or collaborating with peers, all passionate about cybersecurity.
Win Amazing Prizes
Excel in your tasks and stand a chance to win exciting prizes that are not only rewarding but also a testament to your exceptional skills.
Rules of the Contest
-
Reconnaissance Only: No hacking or exploitation of any kind is allowed.
-
Report Submission: Submission of a detailed CSV file in a given structure is mandatory.
-
Presentation: Participants will present their findings in front of a jury.
-
NDA Compliance: All participants must sign an NDA to ensure the confidentiality of the findings and methodologies for the companies participating.
-
Time Limit: All reconnaissance activities must be completed within the specified time frame, i.e 9th Aug to 10th Aug Midnight.
-
Ethical Conduct: Participants must adhere to ethical guidelines and avoid any activities that could cause harm or disruption.
-
Scope: Recon must be limited to the provided target scope. Any findings outside the scope will not be considered.
-
Evidence Collection: All findings must be backed by appropriate evidence, such as screenshots, logs, or other relevant data.
-
Original Work: All work must be original and performed during the contest. Pre-existing reports or findings are not allowed.
-
Winners will be announced on 11th August, in the contest ceremony.